>>3644485
Contributors to SELinux
The following organizations and individuals have contributed to the Security-enhanced Linux project. The listing of contributors is partitioned into two lists:
A list of the original four organizations that contributed to the initial public release of SELinux,
A list of external individuals and organizations that have contributed to SELinux since that initial release.
The Original Contributors
The National Security Agency (NSA)
Researchers in NSA's National Information Assurance Research Laboratory (NIARL) designed and implemented flexible mandatory access controls in the major subsystems of the Linux kernel and implemented the new operating system components provided by the Flask architecture, namely the security server and the access vector cache. The NSA researchers reworked the LSM-based SELinux for inclusion in Linux 2.6. NSA has also led the development of similar controls for the X Window System (XACE/XSELinux) and for Xen (XSM/Flask).
Network Associates Laboratories (NAI Labs)
The Secure Execution Environments group of NAI Labs implemented several additional kernel mandatory access controls, developed the example security policy configuration, ported to the Linux 2.4 kernel, contributed to the development of the Linux Security Modules kernel patch, and adapted the SELinux prototype to LSM.
The MITRE Corporation
The MITRE Corporation enhanced several common utilities to be SELinux-aware and developed application security policies and documentation for the Apache web server, Sendmail, and crond. They also developed a policy analysis tool (SLAT) and a policy generation tool (Polgen).
Secure Computing Corporation (SCC)
Secure Computing Corporation developed a preliminary security policy configuration for the system that was used as a starting point for NAI Labs' configuration. They also developed several new or modified utilities.
https://www.nsa.gov/What-We-Do/Research/SELinux/Contributors/